The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Computer Concepts 2018 Module 7: Digital Security

Across
A malicious attack that takes advantage of previously unknown vulnerabilities.
Using a fake IP or email address to conceal the origin of a packet or message.
Programs designed to disrupt computer operations.
Malware that creates a backdoor for an unauthorized remote access.
A method typically used by hackers for surreptitiously accessing computers.
An email-based scam that's designed to fool users into revealing confidential information.
Software that displays unwanted advertisements or analyzes user online behavior to create a profile used by advertisers.
A method used by hackers to insert malicious code into an otherwise legitimate files or data transmissions.
The use of two identity validators.
An attack in which a target system, such as a Web server, is deliberately flooded with data from a malicious source, denying service to legitimate customers.
An exploit that redirects users to fake Web sites.
An exploit used by hackers to locate computer ports that can be used for surreptitious access.
Any software that covertly gathers user information with the user's knowledge.
A malicious wireless network or hotspot designed to look legitimate.
Malware that encrypts files as part of an exploit to extort money from victims.
Down
An update of the Secure Sockets Layer protocol for encrypting data before it is transmitted over a network.
A program that records a person's keystrokes
A file that verifies the identity of a device.
Unsolicited email typically sent as a bulk or mass mailing.
The unique computer code contained in a virus that security software uses to identify it.
Installing a mobile app by some means other than downloading it from an official app store.
A measure of a password's unpredictability and resistance to recovery.
A computer program that appears to perform one function while actually doing something else.
A malicious exploit in which messages between two people are intercepted without their knowledge.
A type of malware with a small footprint that is "dropped" into a computer to pave the way for a more extensive malware
A group of bots under the remote control of a botmaster.
Software or hardware designed to analyze and control incoming and outgoing packets on a network.
Software that conceals running processes; used by hackers to disguise security breaches and break-ins.
An encryption standard based on the Rijndael encryption algorithm.